Sciweavers

915 search results - page 35 / 183
» Security in Business Process Engineering
Sort
View
MKWI
2008
113views Business» more  MKWI 2008»
13 years 9 months ago
A Rule-based Middleware for Business Process Execution
Abstract. While past research in service oriented computing has focused on the fairly static functional description and the operators of services the dynamic and flexible compositi...
Adrian Paschke, Alexander Kozlenkov
VLDB
2007
ACM
150views Database» more  VLDB 2007»
14 years 1 months ago
Monitoring Business Processes with Queries
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
Catriel Beeri, Anat Eyal, Tova Milo, Alon Pilberg
SECURWARE
2007
IEEE
14 years 1 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
WIRTSCHAFTSINFORMATI
2007
13 years 8 months ago
An Ontology Framework for Semantic Business Process Management
A core challenge in Business Process Management is the continuous, bi-directional translation between (1) a business requirements view on the process space of an enterprise and (2...
Martin Hepp, Dumitru Roman
WWW
2008
ACM
14 years 8 months ago
Composite process oriented service discovery in preserving business and timed relation
This paper proposes an approach for solving the problem of composite process oriented service discovery with preserving business and timed relation. Key to our approach is the def...
Yu Dai, Lei Yang, Bin Zhang, Kening Gao